[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Review of Crypto-Rebels in Cryptologia
In the October issue of Cryptologia, Louis Kruh reviews the "Crypto
Rebels" article by Stephen Levy that appeared in Wired.
Shawn
[email protected]
Article liberated without permission.
----------------------------------------------------------------------
Cryptologia. Vol. XV11, Number 4 (October 1993)
From the column "Reviews and Things Cryptologic" by Louis Kruh.
Crypto Rebels Write-Up
[Wired 1.2]
Wired is a new magazine aimed at the "Digital Generation." The cover
story in its second issue examines the growing "Cypherpunk" movement
to insure individual privacy.
According to the author, Cypherpunks believe that all information about
an individual belongs to that person and opinions, medical records,
personal data collected by local, state or national governmental agencies,
communications sent by the individual or any other information should be
available only if the person involved chooses to reveal it. And the
means through which this privacy would be maintained is by the widespread
use of virtually unbreakable public-key cryptography.
Opposing forces are U.S. government agencies who seek to insure their
ability to read public-key encrypted messages by the continuance of
electronic surveillance and by having access to public-key cryptography's
secret keys when authorized by a judge.
The author suggests that the government cryptologic monopoly was
destroyed in 1975 when Whitfield Diffie created public-key cryptography.
His later work with Martin Hellman is recounted along with the
implementation of the Diffie-Hellman system by three MIT computer
scientists who founded RSA Data Security to market their patented
algorithms.
A well known figure in academic crypto circles, Georgetown Professor
Dorothy Denning, counters Cypherpunk beliefs by pointing out that
"Organized Crime leaders, drug dealers, terrorists, and other criminals
could conspire and act with impunity" if electronic surveillance was
illegal and authorized agencies did not have access to private keys
used in public-key cryptography.
The article explores many views and contains a great deal of
fascinating information.
----------------------------------------------------------------------